Skip to content

Commit 18c5b40

Browse files
authored
Merge pull request #8 from lauradreith/main
Add IAM user long-term credentials network control
2 parents 553ff9e + 041fc14 commit 18c5b40

File tree

2 files changed

+48
-0
lines changed

2 files changed

+48
-0
lines changed
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
{
2+
"Version": "2012-10-17",
3+
"Statement": [
4+
{
5+
"Sid": "EnforceNetworkPerimeterOnIAMUsers",
6+
"Effect": "Deny",
7+
"NotAction": [
8+
"es:ES*",
9+
"dax:GetItem",
10+
"dax:BatchGetItem",
11+
"dax:Query",
12+
"dax:Scan",
13+
"dax:PutItem",
14+
"dax:UpdateItem",
15+
"dax:DeleteItem",
16+
"dax:BatchWriteItem",
17+
"dax:ConditionCheckItem",
18+
"neptune-db:*",
19+
"kafka-cluster:*",
20+
"elasticfilesystem:client*",
21+
"rds-db:connect"
22+
],
23+
"Resource": "*",
24+
"Condition": {
25+
"BoolIfExists": {
26+
"aws:ViaAWSService": "false"
27+
},
28+
"NotIpAddressIfExists": {
29+
"aws:SourceIp": [
30+
"<my-corporate-cidr>"
31+
]
32+
},
33+
"StringNotEqualsIfExists": {
34+
"aws:SourceVpc": [
35+
"<my-vpc>"
36+
]
37+
},
38+
"ArnLike": {
39+
"aws:PrincipalArn": [
40+
"arn:aws:iam::*:user/*"
41+
]
42+
}
43+
}
44+
}
45+
]
46+
}
47+

Protect-cloud-platform-resource/Protect-cloud-platform-resource.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,3 +18,4 @@ Enforce controls to protect your resources in cloud from being modified or delet
1818
| [Deny key actions on Route53 DNS hosted zones](Deny-key-actions-on-Route53-DNS-hosted-zones.json) |Deny route53 domain transfer, modification and deletion.|
1919
| [Prevent IMDSv1](Prevent-IMDSv1.json) |EC2 instances obtain credentials for the instance IAM roles through the Instance Metadata Service (IMDS).IMDSv2 is the most recent secure version of this service, the older version, IMDSv1, should therefore be prevented.|
2020
| [Enforce 30 days for KMS key deletion](Enforce-30-days-for-KMS-deletion.json) |Safeguards production KMS keys by enforcing a minimum 30-day cooldown period before key deletion. This policy helps prevent accidental or unauthorized deletion of critical encryption keys, ensuring the security and availability of encrypted data in production environments.|
21+
| [Deny-use-of-IAM-user-credentials-from-unexpected-networks.json](Deny-use-of-IAM-user-credentials-from-unexpected-networks.json) |Deny use of IAM user long-term access keys from outside of your corporate network or VPCs. We recommend using [IAM roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html) instead of IAM users with long-term access keys, as these access keys remain valid until manually revoked and therefore present a higher security risk. If you still use IAM users in your organization, implement network restrictions to limit exposure and reduce potential misuse.|

0 commit comments

Comments
 (0)